From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

New Opportunities for Compilers in Computer Security., , , , , и . LCPC, том 11882 из Lecture Notes in Computer Science, стр. 54-60. Springer, (2018)TVVF: Estimating the vulnerability of hardware cryptosystems against timing violation attacks., , и . HOST, стр. 72-77. IEEE Computer Society, (2015)Digital fingerprints for low-cost platforms using MEMS sensors., , , , и . WESS, стр. 2:1-2:6. ACM, (2013)Towards the Detection of Malicious URL and Domain Names Using Machine Learning., , и . DoCEIS, том 577 из IFIP Advances in Information and Communication Technology, стр. 109-117. Springer, (2020)Differential Fault Intensity Analysis., , , и . FDTC, стр. 49-58. IEEE Computer Society, (2014)A Configurable and Lightweight Timing Monitor for Fault Attack Detection., , , , , и . ISVLSI, стр. 461-466. IEEE Computer Society, (2016)Analyzing and eliminating the causes of fault sensitivity analysis., , и . DATE, стр. 1-6. European Design and Automation Association, (2014)Lightweight Fault Attack Resistance in Software Using Intra-instruction Redundancy., , , и . SAC, том 10532 из Lecture Notes in Computer Science, стр. 231-244. Springer, (2016)SAFE-HEALTH: A Secure Framework for Advancing Edge-Based Health 5.0., , , , и . WF-IoT, стр. 1-6. IEEE, (2023)Differential Fault Intensity Analysis on PRESENT and LED Block Ciphers., , и . COSADE, том 9064 из Lecture Notes in Computer Science, стр. 174-188. Springer, (2015)